The pilot feed may serve as a model for other states and local governments to quickly and easily augment their cyber defense capabilities.

Updated prescriptive guidance for establishing a secure configuration posture for Amazon, Oracle, Apple iOS, Oracle, as well as new CIS Build Kits.

The December 2020 MS-ISAC newsletters provides 10 cybersecurity shopping tips that can help you stay safe while shopping online.

A vulnerability has been discovered in Mozilla Thunderbird, which could allow for arbitrary code execution.

Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.

CIS Guide explains how best to secure Remote Desktop Protocol (RDP) to protect and defend against the most pervasive cyber threats that are faced today.

The report recommends organizations that use RDP to make sure they’re implementing CIS’s recommendations for a secure remote environment.

The RDP Guide addresses basic cyber hygiene and is intended to assist organizations secure their systems via low-cost, or no-cost mitigations.

The guide leverages best practices from the CIS Controls and secure configuration recommendations from the CIS Benchmarks.

This guide provides an overview of remote desktop protocol (RDP), common attacks associated with it, and how to best protect against an RDP-based attack.

The threat is exacerbated by the volume of data generated during the online shopping season, especially given consumer reluctance to shop in-person.

CIS harnesses the power of collaboration from a community of cybersecurity experts to safeguard public and private organizations against cyber threats.

Implementing foundational cloud security systems to harden environments protect against cyber-attacks and misconfiguration.

The Center for Internet Security (CIS) is celebrating 20 years making the connected world a safer place for people, businesses, and governments worldwide.

Tanium and CIS work in collaboration to educate and empower agencies with the right tools to solve their most challenging cybersecurity

1 2 3 139